Browse the Petri.com Knowledge Center below and get access to years of webinars, whitepapers, ebooks, thought leadership articles, conference sessions, and more!
Most technology used in the workplace today is delivered as a SaaS app, including genAI tools. However, SaaS apps are increasingly adopted and managed outside of the IT team while IT is still held 100% responsible for securing and managing this expanding footprint of “shadow SaaS.” Traditional approaches to IT governance like network-based discovery, blocking,…
Brand launches and rebranding are pivotal moments, aiming to captivate new audiences and showcase evolution. Yet, the power of email signatures—a critical marketing and sales tool—is often overlooked, leaving employees to manually update their own, risking brand inconsistency. Join Nicolas Blank, esteemed Microsoft MVP for M365 Apps & Services, and Grant Tiller, Director of Product…
Join us for a comprehensive exploration of the intersection between artificial intelligence (AI) and data security. This session will include: A thorough review of the risks and benefits of AI in the context of data security A deep dive into Microsoft Copilot and its implications for the security of content in Microsoft 365 Other recent…
More organizations than ever are discovering the value of protecting their Microsoft 365 data. However, let’s face it, deciding how you want to back up that data can be a real challenge. Cloud-based backup services are quickly becoming the most popular option for Microsoft 365, and there is good reason for it! In this Veeam…
Recently Cayosoft and Petri joined forces to run a global survey of the Active Directory (AD) community. The survey was focused on how prepared organizations are for a true AD outage. With thousands of participants, the results were eye-opening and demonstrate that AD Forest Recovery is NOT taken serious enough. Join the webinar and not…
Secure backups start with proper planning. With cyberattacks lurking around every corner, we all have a role to play in security. Worried about the safety of your backups? Confident you can reliably restore your data after an attack? Environments of all sizes require resilience in order to survive one. Join us as we dive into…
Recoverability isn’t a given with Microsoft 365. The fact that organizations need to back up their Microsoft 365 deployments has been well established. However, as important as backups might be, there is one critical item that always seems to get left out of the conversation. That item is recoverability. What you’ll learn: Microsoft 365 data…
Third-party patching complexities getting you down? Navigating remote work setups, patch quality concerns, and overlooked apps can be a headache. Don’t let these challenges leave your cybersecurity vulnerable to data breaches. If third-party patching is a struggle for you, join our webinar to learn: Proven strategies to tackle third-party patching challenges Common mistakes and pitfalls…
Ensuring compliance with common standards and regulations is vital for maintaining the security of your organization’s IT infrastructure. Yet, with evolving regulations and complex IT environments, ongoing compliance is challenging for IT teams. Join this webinar to learn: The importance of patching for preventing data breaches and reducing cyber risks Key compliance frameworks (PCI DSS,…
With cyberattacks evolving, companies have spent millions of dollars on improving their defenses. There have been improvements in stopping threats, but many still get through and cause damage and downtime. Instead of striving to prevent breaches, join this webinar and learn why you should focus on attack resilience and embrace the hacks as learning opportunity….
There is no bigger threat to the technology landscape than ransomware. In this session, a Veeam expert will overview some key tips and tricks to survive your next ransomware incident. The reality is there are 2 types of people in this world: those who have fought ransomware and those who don’t yet fully understand the…
The concept of identity has become crucial in ensuring security, highlighting the importance of privileged access management (PAM) as the foundation of modern identity and access security measures. In this webinar, Josh McDonough, Lead Solutions Engineer at BeyondTrust, will delve into why PAM is at the core of Identity Security and why a comprehensive PAM…